Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication method of tag and backend database in radio-frequency identification (RFID) system based on bit strings

An authentication method and bit string technology, applied in the field of authentication of tags and back-end databases in bit string-based RFID systems, can solve problems such as leakage of confidential information

Inactive Publication Date: 2013-11-06
ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] In the existing technical solution, the PID'' is transmitted in the form of plain text on the unsafe wireless channel between the reader and the tag, and the attacker can obtain the PID'' by monitoring the wireless communication, resulting in the confidential information SID part of leaked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method of tag and backend database in radio-frequency identification (RFID) system based on bit strings
  • Authentication method of tag and backend database in radio-frequency identification (RFID) system based on bit strings
  • Authentication method of tag and backend database in radio-frequency identification (RFID) system based on bit strings

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] Such as Figure 4 Shown, the present invention comprises the following steps:

[0042] 1) The reader sends a random bit string R and query request Query to the tag.

[0043] 2) After receiving the request, the tag generates a random positive integer n 1 and n 2 , resulting in the first bit string PID 1L and the second bit string PID 2R , and calculate the temporary value SID of the tag security identifier temp for

[0044]

[0045] Then calculate the bit string R'=PID 1Ltemp ⊕PID 2Rtemp ⊕R, and send the result R’||n 1 ||n 2 to the reader.

[0046] Among them, ROL is a circular left shift, ROR is a circular right shift, Indicates that the label security identifier SID is cyclically shifted to the left (PID 1L ⊕PID 2R ⊕n 1 ⊕n 2 ) mod L bit, Indicates that the label security identifier SID is cyclically shifted to the right (PID 1L ⊕PID 2R ⊕n 1 ⊕n 2 )mod L bit, mod is the modulus operation; SID is the security identifier of the label, which is a ra...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an authentication protocol of a tag and a backend database in a radio-frequency identification (RFID) system based on bit strings. The authentication protocol comprises the steps that: 1) a reader-writer transmits a random bit string R and a query request to a tag; 2) after the request is received, the tag generates a random positive integer n1 and a random positive integer n2, thereby a first bit string PID1L and a second bit string PID2R, the temporary value SIDtemp of a tag security identifier is calculated, and then the bit string is calculated and a result R'||n1||n2 is transmitted to the reader-writer; 3) after the reader-writer receives the R'||n1||n2 transmitted by the tag, the identity IDReader of the reader-writer and the random bit string R are serially connected to obtain IDReader ||R||R'||n1||n2, the IDReader ||R||R'||n1||n2 is encrypted and the obtained encrypted text is transmitted to the backend database; 4) the backend database conducts calculation to obtain a result, and then whether a proper first variable SIDpre or a second variable SIDcur exists in the backend database or not is determined through searching, wherein the exclusive OR calculation result of PID1Ltemp and PID2Rtemp is equal to the calculated result; 5) after information transmitted by the backend database is received by the reader-writer, decryption is conducted; and 6) verification is conducted.

Description

technical field [0001] The invention relates to a method for authenticating tags and back-end databases in a bit string-based RFID system. Background technique [0002] Such as figure 1 As shown, the flow of the existing reader-writer communication method is: [0003] 1) The reader sends a random number R and a query request to the tag. [0004] 2) After receiving the request, the tab selects the PID 1L and PID 2R , PID 1L It means starting from the leftmost bit of the SID, and the length is n 1 bit string of bits; PID 2R It means starting from the rightmost bit of the SID, and the length is n 2 bit string of bits; where n 1 , n 2 is a random positive integer generated by the label, and satisfies 2L≥Len(n 1 )+Len(n 2 )≥L / 2; L is the length of the tag security identifier SID, in bits; Len(n 1 ) and Len(n 2 ) represent n respectively 1 and n 2 The length of , the unit is bit; SID is the security identifier of the tag, which is a randomly set confidential bit str...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06K17/00
Inventor 甘勇贺蕾金保华张娜孙彤钱慎一
Owner ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY